Professional Documents
Culture Documents
Assignment 2
Group 29
Ritvik Saraf - Devendra Ratnam
120123048 120123013
1. List out all the protocols used by the application at different layers
(only those which you can figure out from traces) and study their
packet formats.
Q1).
as the structure of Ethernet frames, the Physical Layer and its MAC
operation. This page will detail the fundamental structure of the Ethernet
Protocol.
Ethertype: EtherType is a two-octet field in an Ethernet frame. It is used
The first three bytes of the Destination Address are assigned by the IEEE
to the vendor of the adapter and are specific to the vendor. See the MAC
Address page for more information.
The next six bytes of an Ethernet frame make up the Source Address. The
Source Address specifies from which adapter the message originated. Like
the Destination Address, the first three bytes specify the vendor of the
card.
Following the Source Address is a 2 byte field called the Ethertype. The
Ethertype is analogous to the SAPs in the 802.3 frame in that it specifies
the memory buffer in which to place this frame.
Payload Length (16 bits) is used to assign length. This is discussed later.
Next Header (8 bits) identifies the type of header that follows the IPv6 header.
Hop Limit (8 bits) is used to limit life of a packet on the network. This is discussed
later.
Source and Destination Addresses (each 128 bits) assigns the source and
destination addresses.
Service Model
Unreliable unordered datagram service
Addresses multiplexing of multiple connections
Multiplexing
16-bit port numbers (some are well-known)
Checksum
Validate header
Optional in IPv4
Mandatory in IPv6
Data (variable): The higher-layer data payload. The length of this field MUST be
inferred from the remaining size of the packet reported by the lower-level transport.
The size is the total number of bytes in the packet minus the 48 bytes of previous
Data frame fields.
5. Calculate the following statistics from your traces when you perform
experiment at different
times of the day: Throughput, RTT, Packet size, No. of packets lost,
number of UDP & TCP
packets, number of responses received with respect to one request sent.
Throughput:
Packets Lost
6. Check if the whole content is being sent from same location/source. List
out the IP
addresses of content providers if there exist multiple sources and explain
the reason behind
it.
Once the connection between the source and destination is established and the
content is being directly sent from point-to-point P2P.